Menu
Domain - 1: Security & Risk Management
Information or Data should be protected against any unauthorized changes. Integrity preserves the accuracy and completeness of the information. Let me ask you this question?
How will you verify that the software you download is an authentic or original executable/binary published by the software provider? - Software companies generally publish the hash value of the software along with it. To verify the integrity of the software, you'll compute the executable hash and match it with the one posted by the software provider.
0 Comments
Confidentiality: It's a pretty straightforward concept - Just like your phone, wallet, or bank account, only authorized entities have access to the data. Think about your Bank account to remember this concept.
Your bank credentials are exclusive to your account and must not be shared with anyone else. What if the bank starts sharing your data with another customer - will you trust the back? I guess "No." Therefore, authorized entities should only access information to build trust between the organization and the customer. |
Archives
January 2024
Categories |